Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Advertised VOID ‘AV Killer’ with Kernel-level Termination Claims

Hackers Advertised VOID ‘AV Killer’ with Kernel-level Termination Claims

Posted on December 30, 2025December 30, 2025 By CWS

The cybercriminal risk actor often called Crypt4You has just lately emerged on underground boards and darkish net marketplaces, promoting a classy instrument named VOID KILLER.

This malicious software program operates as a kernel-level antivirus and endpoint detection response (EDR) course of killer, designed to evade and neutralize safety defenses.

The instrument is being marketed as a substitute for conventional crypters, representing a major shift in how cybercriminals strategy protection bypass mechanisms.

By focusing on the core of working methods, VOID KILLER makes an attempt to get rid of protecting obstacles that organizations depend on to detect and cease malicious actions.

The emergence of VOID KILLER highlights an escalating risk panorama the place attackers are investing in superior instruments to compromise enterprise environments.

In contrast to conventional malware that merely encrypts code, this kernel-level resolution straight terminates safety processes earlier than they’ll reply to threats.

Safety researchers have documented that the instrument straight challenges fashionable defensive architectures, significantly these counting on behavioral detection and real-time monitoring capabilities.

KrakenLabs researchers and analysts recognized and documented the risk after analyzing the instrument’s promoting supplies and claimed capabilities.

VOID KILLER Evaluation

The evaluation revealed that VOID KILLER represents a harmful evolution in anti-detection know-how, providing cybercriminals the means to function with decreased oversight inside compromised methods.

🚨 VOID KILLER “AV killer” marketed with kernel-level termination claimsThe risk actor #Crypt4You is promoting a instrument known as VOID KILLER: a “kernel-level” AV/EDR course of killer marketed as a substitute for crypters by underground boards and a darkish net store.🛠️ Claimed… pic.twitter.com/Ux1oulM4wo— KrakenLabs (@KrakenLabs_Team) December 30, 2025

Kernel-level termination represents essentially the most important technical side of VOID KILLER’s performance. Working on the kernel stage means the instrument executes with the best system privileges, permitting it to bypass commonplace user-mode protections.

In accordance with the risk intelligence findings, VOID KILLER claims to terminate Home windows Defender and roughly fifty consumer-grade antivirus options immediately, reportedly with zero detection at each scan and runtime phases.

The instrument employs polymorphic construct methods, producing contemporary file hashes with every compilation to evade signature-based detection methods.

Moreover, it incorporates automated Consumer Account Management (UAC) bypass mechanisms, enabling it to escalate privileges with out triggering safety alerts.

The payload-agnostic structure permits operators to inject any executable file, making VOID KILLER appropriate with numerous malware households.

Notably, the vendor gives extra variants focusing on enterprise options like CrowdStrike and SentinelOne, offered individually for enhanced market penetration.

The risk actor costs customized VOID KILLER builds at 300 {dollars} per occasion, accepting Bitcoin, Ethereum, Litecoin, and Monero. An indication video shared by Crypt4You additional validates the instrument’s harmful capabilities.

Organizations utilizing Home windows Defender, client antivirus software program, and even superior EDR options face heightened threat publicity.

The appearance of VOID KILLER underscores the need for defense-in-depth methods and kernel-level safety implementations to counter rising threats successfully.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Advertised, Claims, Hackers, Kernellevel, Killer, Termination, VOID

Post navigation

Previous Post: ESET Warns AI-driven Malware Attack and Rapidly Growing Ransomware Economy
Next Post: Massive Magecart with 50+ Malicious Scripts Hijacking Checkout and Account Creation Flows

Related Posts

Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability Cyber Security News
Adversarial Machine Learning – Securing AI Models Adversarial Machine Learning – Securing AI Models Cyber Security News
INE Expands Cross-Skilling Innovations INE Expands Cross-Skilling Innovations Cyber Security News
Azure Identity Token Vulnerability Enables Tenant-Wide Compromise in Windows Admin Center Azure Identity Token Vulnerability Enables Tenant-Wide Compromise in Windows Admin Center Cyber Security News
CISA Urges Security for Microsoft Intune After Breach CISA Urges Security for Microsoft Intune After Breach Cyber Security News
Hackers Infiltrated Maven Central Masquerading as a Legitimate Jackson JSON Library Hackers Infiltrated Maven Central Masquerading as a Legitimate Jackson JSON Library Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark